Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 2015-11-25 |
Product | Openshift Container Platform | Last view | 2024-01-09 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2024-01-09 | CVE-2023-6476 | A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node. |
8.1 | 2023-12-21 | CVE-2023-2585 | Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client. |
5.9 | 2023-12-18 | CVE-2023-48795 | The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. |
5.4 | 2023-12-14 | CVE-2023-6134 | A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748. |
7.2 | 2023-11-02 | CVE-2023-5408 | A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster. |
7.5 | 2023-10-10 | CVE-2023-44487 | The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. |
5.5 | 2023-10-06 | CVE-2023-5366 | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. |
5.3 | 2023-10-05 | CVE-2022-4145 | A content spoofing flaw was found in OpenShift's OAuth endpoint. This flaw allows a remote, unauthenticated attacker to inject text into a webpage, enabling the obfuscation of a phishing operation. |
7.5 | 2023-10-05 | CVE-2022-3248 | A flaw was found in OpenShift API, as admission checks do not enforce "custom-host" permissions. This issue could allow an attacker to violate the boundaries, as permissions will not be applied. |
5.3 | 2023-10-04 | CVE-2023-3153 | A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured. |
7.1 | 2023-10-04 | CVE-2023-2422 | A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients. |
8 | 2023-09-24 | CVE-2023-1260 | An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod. |
5.3 | 2023-09-15 | CVE-2022-3466 | The version of cri-o as released for Red Hat OpenShift Container Platform 4.9.48, 4.10.31, and 4.11.6 via RHBA-2022:6316, RHBA-2022:6257, and RHBA-2022:6658, respectively, included an incorrect version of cri-o missing the fix for CVE-2022-27652, which was previously fixed in OCP 4.9.41 and 4.10.12 via RHBA-2022:5433 and RHSA-2022:1600. This issue could allow an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. For more details, see https://access.redhat.com/security/cve/CVE-2022-27652. |
7.5 | 2023-07-05 | CVE-2023-3089 | A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. |
6.5 | 2023-06-06 | CVE-2023-2253 | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. |
8.2 | 2023-04-10 | CVE-2023-1668 | A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. |
5.5 | 2023-03-24 | CVE-2021-3684 | A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user. |
6.5 | 2023-03-23 | CVE-2023-0056 | An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability. |
7 | 2023-03-03 | CVE-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression. |
5.9 | 2022-12-28 | CVE-2021-4294 | A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987. |
7.1 | 2022-09-13 | CVE-2022-2990 | An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. |
7.1 | 2022-09-13 | CVE-2022-2989 | An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container. |
6.3 | 2022-09-01 | CVE-2022-1677 | In OpenShift Container Platform, a user with permissions to create or modify Routes can craft a payload that inserts a malformed entry into one of the cluster router's HAProxy configuration files. This malformed entry can match any arbitrary hostname, or all hostnames in the cluster, and direct traffic to an arbitrary application within the cluster, including one under attacker control. |
6.5 | 2022-09-01 | CVE-2022-1632 | An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality. |
8.6 | 2022-08-31 | CVE-2022-2132 | A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
9% (16) | CWE-502 | Deserialization of Untrusted Data |
6% (11) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
4% (8) | CWE-770 | Allocation of Resources Without Limits or Throttling |
4% (8) | CWE-416 | Use After Free |
4% (8) | CWE-20 | Improper Input Validation |
4% (7) | CWE-532 | Information Leak Through Log Files |
3% (6) | CWE-787 | Out-of-bounds Write |
3% (6) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
2% (5) | CWE-522 | Insufficiently Protected Credentials |
2% (5) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
2% (5) | CWE-362 | Race Condition |
2% (5) | CWE-352 | Cross-Site Request Forgery (CSRF) |
2% (5) | CWE-266 | Incorrect Privilege Assignment |
2% (5) | CWE-125 | Out-of-bounds Read |
2% (4) | CWE-276 | Incorrect Default Permissions |
2% (4) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
1% (3) | CWE-704 | Incorrect Type Conversion or Cast |
1% (3) | CWE-287 | Improper Authentication |
1% (3) | CWE-269 | Improper Privilege Management |
1% (3) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
1% (2) | CWE-706 | Use of Incorrectly-Resolved Name or Reference |
1% (2) | CWE-552 | Files or Directories Accessible to External Parties |
1% (2) | CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsa... |
1% (2) | CWE-295 | Certificate Issues |
1% (2) | CWE-200 | Information Exposure |
Snort® IPS/IDS
Date | Description |
---|---|
2020-02-27 | Kibana Timelion prototype pollution code execution attempt RuleID : 52835 - Type : SERVER-WEBAPP - Revision : 1 |
2019-06-11 | Jenkins CI Server ASTTest code execution attempt RuleID : 50041 - Type : SERVER-WEBAPP - Revision : 2 |
2019-04-23 | Jenkins Groovy metaprogramming remote code execution attempt RuleID : 49499 - Type : SERVER-WEBAPP - Revision : 1 |
2019-04-23 | Jenkins Groovy metaprogramming remote code execution attempt RuleID : 49498 - Type : SERVER-WEBAPP - Revision : 1 |
2019-02-07 | Kibana Console for Elasticsearch local file inclusion attempt RuleID : 48815 - Type : SERVER-WEBAPP - Revision : 3 |
2019-01-10 | Kubernetes API Server bypass attempt RuleID : 48548 - Type : SERVER-OTHER - Revision : 1 |
2019-01-08 | Kubernetes API Server bypass attempt RuleID : 48500 - Type : SERVER-OTHER - Revision : 1 |
2018-04-03 | Jackson databind deserialization remote code execution attempt RuleID : 45779 - Type : SERVER-OTHER - Revision : 1 |
2018-04-03 | Jackson databind deserialization remote code execution attempt RuleID : 45778 - Type : SERVER-OTHER - Revision : 1 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45016 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45015 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45014 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45013 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45012 - Type : FILE-OTHER - Revision : 4 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45011 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45010 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45009 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45008 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45007 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45006 - Type : FILE-OTHER - Revision : 4 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45005 - Type : FILE-OTHER - Revision : 4 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45004 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45003 - Type : FILE-OTHER - Revision : 3 |
2017-12-29 | Jackson databind deserialization remote code execution attempt RuleID : 45002 - Type : FILE-OTHER - Revision : 3 |
2016-03-29 | Java Library CommonsCollection unauthorized serialized object attempt RuleID : 37860 - Type : SERVER-WEBAPP - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-11 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZA-2018-077.nasl - Type: ACT_GATHER_INFO |
2019-01-10 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2019-1138.nasl - Type: ACT_GATHER_INFO |
2019-01-08 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2019-1010.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-56221eb24b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-0b038c7047.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-12b934e224.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-314913636b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-381ab64b59.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-54a5bcc7e4.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-81ee973d7c.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9dbe983805.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-bf292e6cdf.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-c8c7d35b83.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-ca03363d57.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-fb2afee474.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1430.nasl - Type: ACT_GATHER_INFO |
2018-12-28 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1419.nasl - Type: ACT_GATHER_INFO |
2018-12-18 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0112.nasl - Type: ACT_GATHER_INFO |
2018-12-14 | Name: The remote Kubernetes server is affected by a proxy request handling vulnerab... File: kube_cve_2018_1002105.nasl - Type: ACT_ATTACK |
2018-12-10 | Name: The remote EulerOS host is missing multiple security updates. File: EulerOS_SA-2018-1393.nasl - Type: ACT_GATHER_INFO |
2018-12-10 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2018-1391.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: A job scheduling and management system hosted on the remote web server is aff... File: jenkins_2_154.nasl - Type: ACT_GATHER_INFO |
2018-12-07 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1110.nasl - Type: ACT_GATHER_INFO |
2018-12-04 | Name: The remote host contains an application affected by a privilege escalation vu... File: kube_1_12_3.nasl - Type: ACT_GATHER_INFO |
2018-12-01 | Name: The remote Debian host is missing a security update. File: debian_DLA-1601.nasl - Type: ACT_GATHER_INFO |